{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:35:02Z","timestamp":1725467702133},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647324"},{"type":"electronic","value":"9783540691013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0053724","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T14:57:43Z","timestamp":1152197863000},"page":"90-98","source":"Crossref","is-referenced-by-count":0,"title":["Low-cost secure server connection with limited-privilege clients"],"prefix":"10.1007","author":[{"given":"Uri","family":"Blumenthal","sequence":"first","affiliation":[]},{"given":"N. C.","family":"Hien","sequence":"additional","affiliation":[]},{"given":"J. H.","family":"Rooney","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Uri Blumenthal and Bert Wijnen, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), RFC2274, January 1998.","DOI":"10.17487\/rfc2264"},{"key":"9_CR2","unstructured":"Uri Blumenthal, N. C. Hien, Bert Wijnen, Remote Key Update in SNMPv3, Proceedings of IEEE SICON'98, to appear."},{"key":"9_CR3","unstructured":"David Flanagan, Java in a Nutshell, O'Reilly Publishing, 1997. ISBN 1-56592-304-9."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC2104, February 1997.","DOI":"10.17487\/rfc2104"},{"key":"9_CR5","unstructured":"Gary McGraw and Edward Feiten, Java Security, Wiley Computer Publishing, 1997.ISBN 0-471-17842-X."},{"key":"9_CR6","unstructured":"A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. ISBN 0-8493-8523-7."},{"key":"9_CR7","unstructured":"Bruce Schneier, Applied Cryptography, 2nd edition. John Wiley and Sons, 1996. ISBN 0-471-12845-7."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"R. Thayer, N. Doraswamy, R. Glenn, IP Security Document Roadmap, Internet Draft, November 1997. http:\/\/ds.internic.net\/internat-drafts\/draft-ietf-ipsec-doc-roadmap-02.txt","DOI":"10.17487\/rfc2411"},{"key":"9_CR9","unstructured":"Cryptix Development Team, International Java Cryptographic Extensions, 1998. http:\/\/www.systemics.com\/software\/cryptix-java\/"},{"key":"9_CR10","unstructured":"FIPS 180-1: Secure Hash Standard, NIST, April 1995."},{"key":"9_CR11","unstructured":"Java Home Page, http:\/\/java.sun.com"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T21:22:41Z","timestamp":1555708961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647324","9783540691013"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0053724","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}